期刊文献+

防火墙规则间包含关系的解析方法 被引量:5

Analysis method of inclusion relations between firewall rules
下载PDF
导出
摘要 针对防火墙规则集中规则间的相互关系难以把握,从而导致防火墙无法正确地过滤数据包的问题,提出了一种基于集合理论的规则间包含关系的解析方法。该方法在不考虑规则动作的情况下,基于集合理论的包含关系来解析和分类规则之间的关系,简化了分析规则间相互关系的过程。并且使用高效的函数式编程语言Haskell实现了所提出的方法,整体代码简洁、易于维护和扩展。实验结果表明,对于中小规模的防火墙规则集,能够快速而有效地解析规则间的包含关系,并且能够为后续的规则间的异常检测提供重要的依据。 It is difficult to understand all the relations between firewall rules. Poorly-organized rules may cause the problem that firewall could not filter packets correctly. In order to solve this problem, an analysis method of inclusion relations between firewall rules based on set theory was proposed. Based on the inclusion relations in set theory, the proposed method analyzed and classified the relations between firewall rules without considering the actions of rules. The proposed method simplified the process of analysis relations between firewall rules, and it was implemented by using a functional programming language, Haskell. The whole Haskell codes were concise, which also were easy to maintain and expand. The experimental results show that, with regard to medium scale sets of rules, the proposed method can analyze the inclusion relations between firewall rules rapidly and effectively. The proposed method also provides an important basis for the succeeding rules conflict detection.
作者 殷奕 汪芸
出处 《计算机应用》 CSCD 北大核心 2015年第11期3083-3086,3101,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(60973122) 国家973计划项目
关键词 网络安全 防火墙 规则集 函数式编程语言 集合理论 network security firewall rules set functional programming language set theory
  • 相关文献

参考文献2

二级参考文献14

  • 1田大新,刘衍珩,李永丽,唐怡.数据包过滤规则的快速匹配算法和冲突检测[J].计算机研究与发展,2005,42(7):1128-1135. 被引量:14
  • 2张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 3Al-Shaer E,Hamed H.Discovery of Policy Anomalies in Distributed Firewalls[C] // IEEE INFOCOM '04.vol.4,2004:2605-2616. 被引量:1
  • 4Yuan L,Chen H,Mai J,et al.Fireman:A Toolkit for Firewall Modeling and Analysis[C] //Proc.IEEE Symp.Security and Privacy.2006:15. 被引量:1
  • 5Alfaro J,Boulahia-Cuppens N,Cuppens F.Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies[J].Int'l J.Information Security,2008,7 (2):103-122. 被引量:1
  • 6Hari A,Suri S,Parulkar G M.Detecting and resolving packet filter conflicts[C] //INFOCOM.2000(3):1203-1212. 被引量:1
  • 7Fu Z,Wu S F,Huang H,et al.IPSec/VPN security policy:Correctness,conflict detection,and resolution[C] // Proceedings of Policy2001 Workshop.January 2001. 被引量:1
  • 8Golnabi K,Min R K,Khan L,et al.Analysis of firewall policy rules using data mining techniques[C] // IEEE/IFIP Network Operations and Management Symposium (NOMS 2006).April 2006. 被引量:1
  • 9Hu H,Ahn G J,Kulkarni K.Detecting and resolving firewall policy anomalies[J].IEEE Transactions on Dependable and Se cure Computing,2012,9 (3):318-331. 被引量:1
  • 10Abedin M,Nessa S,Khan L,et al.Detection and resolution of anomalies in firewall policy rules[C] //DBSEC'06 Proceedings of the 20th IFIP WG 11.3 Working Conference on Data and Applications Security.2006:15-29. 被引量:1

共引文献6

同被引文献42

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部